carlospolop / tfstate2IAMView external linksLinks
☆13Mar 31, 2023Updated 2 years ago
Alternatives and similar repositories for tfstate2IAM
Users that are interested in tfstate2IAM are comparing it to the libraries listed below
Sorting:
- ☆24Mar 20, 2023Updated 2 years ago
- ☆96Jul 23, 2025Updated 6 months ago
- ☆20Feb 9, 2024Updated 2 years ago
- ☆140Dec 31, 2025Updated last month
- ☆14Jul 21, 2024Updated last year
- This example demonstrates a pattern to leverage multiple identity providers with an API Gateway and manage Authorization with Amazon Veri…☆18Jan 22, 2024Updated 2 years ago
- ☆24Nov 3, 2022Updated 3 years ago
- Unofficial list of approved tools for OSCP☆27Apr 25, 2023Updated 2 years ago
- Privilege escalation in Docker☆31Jun 30, 2022Updated 3 years ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆30Aug 28, 2023Updated 2 years ago
- PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆29May 5, 2023Updated 2 years ago
- Deploy Kubernetes Helm Charts for Check Point CloudGuard☆19Oct 21, 2025Updated 3 months ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆22Dec 28, 2025Updated last month
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- Writeups for Vulnhub, Tryhackme and Others☆13Jun 25, 2023Updated 2 years ago
- Enhance GitHub security by revoking unused credentials automatically with TenTwentyOne's GitHub Action☆17Apr 4, 2025Updated 10 months ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- ☆16Nov 30, 2025Updated 2 months ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Jun 20, 2023Updated 2 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 2 months ago
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆30Jan 27, 2026Updated 2 weeks ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Jun 22, 2025Updated 7 months ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 3 years ago
- ☆13Jun 10, 2024Updated last year
- ☆11Jan 3, 2023Updated 3 years ago
- GCP cloud security CTF☆47Jun 25, 2025Updated 7 months ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- This was made with the intention of providing evidence of work done towards furthering education in cyber security.☆10May 12, 2022Updated 3 years ago
- This repository shows how to setup Centralized CloudWatch Observability Manager using Terraform☆17Nov 28, 2024Updated last year
- Configure and deploy AWS GuardDuty.☆11Sep 9, 2025Updated 5 months ago
- Slack alert bot for matching Github Audit Events☆10Nov 12, 2024Updated last year
- 🚨 Prevent losing production data by enabling the retain deletion policy for your AWS Amplify API!☆12Jul 25, 2022Updated 3 years ago
- ☆11Nov 12, 2024Updated last year
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆17Jan 22, 2026Updated 3 weeks ago
- Lambda function that automatically create or update AWS resource with AWS service's IP ranges from the ip-ranges.json file. You can confi…☆17Jul 2, 2024Updated last year
- ☆12Jan 14, 2025Updated last year
- Recordization library☆11Jan 26, 2026Updated 2 weeks ago